Author:
Abdo Jacques Bou,Chaouchi Hakima,Demerjian Jacques
Reference39 articles.
1. Shokri, R., Theodorakopoulos, G., Le Boudec, J., & Hubaux, J. (2011). Quantifying location privacy. In IEEE symposium on security and privacy (SP), 2011 (pp. 247–262). New York: IEEE Press.
2. 3rd Generation Partnership Project, 3GPP TR 33.821 V9.0.0 (2009-06), 3GPP Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 9).
3. Mjølsnes, S., & Tsay, J. K. (2012). Computational security analysis of the UMTS and LTE authentication and key agreement protocols.
arXiv:1203.3866
.
4. Nergiz, M. E., Atzori, M., & Saygin, Y. (2008). Towards trajectory anonymization: a generalization-based approach. In Proceedings of the SIGSPATIAL ACM GIS 2008 international workshop on security and privacy in GIS and LBS (pp. 52–61). New York: ACM.
5. Sweeney, L. (2002). k-Anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献